Security requirements specification by formal methods: a research metadata analysis

被引:0
|
作者
Aditya Dev Mishra
Khurram Mustafa
机构
[1] Galgotias College of Engineering and Technology,Department of Computer Science and Engineering
[2] Jamia Millia Islamia,Department of Computer Science
[3] A Central University,undefined
来源
关键词
Security requirement specification; Formal specification; Security requirement engineering; Formal framework; Metadata;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, the field of security requirements specification by formal methods has changed radically. The security requirement specification is now one of the widely recognized as well as actively pursued research challenges in both requirement engineering and security engineering communities. In this paper, we focus on the research metadata to find the state of the art in the field of security requirements specification using the formal approach. In order, a review was taken up to perform metadata, obtained from frequently used databases. In total, 200 publications were retrieved; out of which 110 were found to be relevant to our research questions. The results of metadata provided an insight into the main contributions of the field, research gaps, and challenges, which motivated the discussion for important research direction in the future.
引用
收藏
页码:41847 / 41866
页数:19
相关论文
共 50 条
  • [1] Security requirements specification by formal methods: a research metadata analysis
    Mishra, Aditya Dev
    Mustafa, Khurram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41847 - 41866
  • [2] A review on security requirements specification by formal methods
    Mishra, Aditya Dev
    Mustafa, Khurram
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [3] A Formal Methods Approach to Security Requirements Specification and Verification
    Rouland, Quentin
    Hamid, Brahim
    Bodeveix, Jean-Paul
    Filali, Mamoun
    [J]. 2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 236 - 241
  • [4] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [5] Research on formal security policy model specification and its formal analysis
    Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    [J]. Tongxin Xuebao, 2006, 6 (94-101):
  • [6] Applying practical formal methods to the specification and analysis of security properties
    Heitmeyer, C
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 84 - 89
  • [7] FORMAL SPECIFICATION OF SECURITY REQUIREMENTS USING THE THEORY OF NORMATIVE POSITIONS
    JONES, AJI
    SERGOT, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 103 - 121
  • [8] Combining formal specification methods and informal specification methods for requirement analysis
    Zhang, LC
    [J]. 1997 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS 1 AND 2: PACRIM 10 YEARS - 1987-1997, 1997, : 444 - 447
  • [9] Formal Specification and Analysis Approaches for Spacecraft Attitude Control Requirements
    Gross, Kerianne H.
    [J]. 2017 IEEE AEROSPACE CONFERENCE, 2017,
  • [10] A generic approach to the formal specification of requirements
    Peper, C
    Gotzhein, R
    Kronenburg, M
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 252 - 261